Your browser is incompatible with this site. Upgrade to a different browser like Google Chrome or Mozilla Firefox to experience this site.
1109 Results Found
Global Knowledge Course Director and Lab Topology Architect Joey DeWiele, a specialist in Unified Communications, explains the difference between our Cisco Unified Communications courses - ACUCW1 & ACUCW2.
In any operational data center, it is critical to have the highest degree of visibility on network traffic for operations and application troubleshooting. In this white paper, we discuss how to achieve optimal visibility of any type of application traffic with Cisco Application Centric Architecture, or ACI.
As you may recall, we can use extended IP ACLs to filter packets based on source address, destination address, transport layer protocols, and other options, as follows: access-list 106 permit tcp host 1.2.3.4 host 5.6.7.8 eq telnet For a packet to be permitted by...
Having discussed general ACL rules and syntax, let’s now turn to the differences between standard and extended ACLs. As you might recall, numbered ACLs fall into several ranges: 1 – 99: Standard IP 100 – 199: Extended IP 1300 - 1999: Standard IP (expanded rang...
In ACLs - Part 1 we learned the basics of access lists, including the facts that ACLs: Are created in global config mode End with an implicit “deny any” (which can be overridden) Must be placed into service somewhere to have any effect Thus, the commands: Rout...
Watch John Walter, Solution Architect for Red Hat's Training and Certification team as he discusses the emergence of radically simple Ansible automation and answers your questions.
The CCNAX - CCNA Routing and Switching Boot Camp is a great option to obtain Cisco Routing and Switching skills while pursuing the CCNA Routing and Switching certification.
This Microsoft and Global Knowledge 1-hour webinar event gives you an overview to the different Microsoft solutions for managing security in your organization. Explore how Microsoft provides a holistic approach to security, helping you to protect identities, data, applications, and devices across on-premises, cloud, and mobile.
Here's an introduction to encryption. What is it? Why do we need it? It's a complicated area, so we're here to help get your started. You'll understand the general function of three categories of mathematical ciphers: Symmetric, Asymmetric and Hashing.
Learn the ITIL® concepts of accountability, boundaries, and consistency (the ABCs) and discover how ITIL helps establish, manage, and maintain the ABCs.